Home Search

rudra srinivas - search results

If you're not happy with the results, please do another search
Liquid Exchange Hack

6 Times Digital Currency Made Headlines in 2019

By Rudra Srinivas Since the inception of cryptocurrency (Bitcoin) in 2009, there is a significant evolution of blockchain technology and a variety of challenges as...
Tarun Wig

“Multiple factor authentication can protect users from hacking attempts”

Tarun Wig is a young entrepreneur with over a decade of industry experience. He’s the co-founder of Innefu Labs and his expertise lies in...
Cyberattack on Ireland's Health care

7 Times Ransomware Became a Major Healthcare Hazard

By Rudra Srinivas Cyber-attacks on healthcare organizations has become a trend in the last few years. With sensitive information of their patients with them, healthcare...
Bob Diachenko

“Invest in Employee Education rather than buying Protective Software and Hardware”

Bob Diachenko is a Cyber Threat Intelligence Director and journalist at SecurityDiscovery.com, a cybersecurity research blog. Bob has over 12 years’ experience working in...
Ethical Hackers

The Black Hat Hackers who Turned Over a New Leaf

By Rudra Srinivas Ever since IBM’s John Patrick coined the term ‘Ethical Hacking’ in 1995, the profession has grown to become a much-needed aspect in...
email security

5 Best Practices to Strengthen Email Security in your Organization

By Rudra Srinivas Most companies rely on e-mail correspondence as a primary means of communication even when it comes to sharing classified information like customer...
Michael Raypold

“Build your processes around the ability to stay agile”

As the Chief Technology Officer of Echosec, Michael Raypold oversees the strategy and implementation of the engineering and product development for the company’s OSINT...

“Access to personal data by the state poses an enormous threat to privacy”

Archie Jackson, the AVP - Technology/Information Security of Genpact, is a senior technology professional with more than 17 years of insightful experience in IT...
Wahab Yusoff

“Best way to handle malware attacks is automation and continuous monitoring”

Wahab Yusoff is a veteran in the information technology industry. The Vice President, Asia, of ForeScout Technologies Inc. has assisted a number of organizations in establishing...
Abhinav Biswas

“No silver bullet to effectively mitigate emergent IoT threats”

Abhinav Biswas, the Alt. CISO for Electronics Corporation of India Limited (ECIL), Dept. of Atomic Energy, Govt. of India, has a wide range of agile...